summaryrefslogtreecommitdiffstats
path: root/security/integrity (follow)
Commit message (Expand)AuthorAgeFilesLines
* Merge tag 'for-v5.9' of git://git.kernel.org/pub/scm/linux/kernel/git/jmorris...Linus Torvalds2020-08-114-4/+4
|\
| * Replace HTTP links with HTTPS ones: securityAlexander A. Klimov2020-08-064-4/+4
* | Merge tag 'integrity-v5.9' of git://git.kernel.org/pub/scm/linux/kernel/git/z...Linus Torvalds2020-08-0612-140/+283
|\ \
| * | integrity: remove redundant initialization of variable retColin Ian King2020-07-271-1/+1
| * | ima: move APPRAISE_BOOTPARAM dependency on ARCH_POLICY to runtimeBruno Meneguele2020-07-212-1/+7
| * | ima: AppArmor satisfies the audit rule requirementsTyler Hicks2020-07-211-1/+1
| * | ima: Rename internal filter rule functionsTyler Hicks2020-07-212-25/+21
| * | ima: Support additional conditionals in the KEXEC_CMDLINE hook functionTyler Hicks2020-07-207-22/+28
| * | ima: Use the common function to detect LSM conditionals in a ruleTyler Hicks2020-07-201-9/+2
| * | ima: Move comprehensive rule validation checks out of the token parserTyler Hicks2020-07-203-46/+37
| * | ima: Use correct type for the args_p member of ima_rule_entry.lsm elementsTyler Hicks2020-07-201-9/+9
| * | ima: Shallow copy the args_p member of ima_rule_entry.lsm elementsTyler Hicks2020-07-201-10/+8
| * | ima: Fail rule parsing when appraise_flag=blacklist is unsupportableTyler Hicks2020-07-201-1/+14
| * | ima: Fail rule parsing when the KEY_CHECK hook is combined with an invalid condTyler Hicks2020-07-171-0/+7
| * | ima: Fail rule parsing when the KEXEC_CMDLINE hook is combined with an invali...Tyler Hicks2020-07-171-0/+21
| * | ima: Fail rule parsing when buffer hook functions have an invalid actionTyler Hicks2020-07-171-2/+38
| * | ima: Free the entire rule if it fails to parseTyler Hicks2020-07-171-1/+2
| * | ima: Free the entire rule when deleting a list of rulesTyler Hicks2020-07-171-5/+24
| * | ima: Have the LSM free its audit ruleTyler Hicks2020-07-172-1/+6
| * | IMA: Add audit log for failure conditionsLakshmi Ramasubramanian2020-07-174-22/+51
| * | integrity: Add errno field in audit messageLakshmi Ramasubramanian2020-07-172-1/+23
* | | integrity/ima: switch to using __kernel_readChristoph Hellwig2020-07-081-13/+1
|/ /
* | ima: extend boot_aggregate with kernel measurementsMaurizio Drocco2020-06-252-2/+15
* | ima: Replace zero-length array with flexible-arrayGustavo A. R. Silva2020-06-161-2/+2
* | Merge tag 'integrity-v5.8-fix' of git://git.kernel.org/pub/scm/linux/kernel/g...Linus Torvalds2020-06-121-1/+2
|\ \
| * | ima: fix mprotect checkingMimi Zohar2020-06-121-1/+2
* | | ima: Remove __init annotation from ima_pcrread()Roberto Sassu2020-06-081-1/+1
* | | Merge tag 'integrity-v5.8' of git://git.kernel.org/pub/scm/linux/kernel/git/z...Linus Torvalds2020-06-0611-86/+384
|\| | | |/ |/|
| * ima: Directly free *entry in ima_alloc_init_template() if digests is NULLRoberto Sassu2020-06-051-2/+3
| * ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init()Roberto Sassu2020-06-034-5/+24
| * ima: Directly assign the ima_default_policy pointer to ima_rulesRoberto Sassu2020-06-031-2/+1
| * ima: verify mprotect change is consistent with mmap policyMimi Zohar2020-05-221-0/+51
| * evm: Fix possible memory leak in evm_calc_hmac_or_hash()Roberto Sassu2020-05-081-1/+1
| * ima: Set again build_ima_appraise variableKrzysztof Struczynski2020-05-081-2/+8
| * ima: Remove redundant policy rule set in add_rules()Krzysztof Struczynski2020-05-081-4/+1
| * ima: Fix ima digest hash table key calculationKrzysztof Struczynski2020-05-081-3/+4
| * ima: Use ima_hash_algo for collision detection in the measurement listRoberto Sassu2020-04-203-5/+23
| * ima: Calculate and extend PCR with digests in ima_template_entryRoberto Sassu2020-04-203-15/+58
| * ima: Allocate and initialize tfm for each PCR bankRoberto Sassu2020-04-201-26/+119
| * ima: Switch to dynamically allocated buffer for template digestsRoberto Sassu2020-04-206-10/+45
| * ima: Store template digest directly in ima_template_entryRoberto Sassu2020-04-203-24/+9
| * ima: Evaluate error in init_ima()Roberto Sassu2020-04-201-0/+3
| * ima: Switch to ima_hash_algo for boot aggregateRoberto Sassu2020-04-202-11/+58
* | evm: Fix a small race in init_desc()Dan Carpenter2020-05-151-22/+22
* | evm: Fix RCU list related warningsMadhuparna Bhowmik2020-05-083-4/+11
* | ima: Fix return value of ima_write_policy()Roberto Sassu2020-05-081-2/+1
* | evm: Check also if *tfm is an error pointer in init_desc()Roberto Sassu2020-05-081-1/+1
* | ima: Set file->f_mode instead of file->f_flags in ima_calc_file_hash()Roberto Sassu2020-05-081-6/+6
|/
* Merge branch 'next-integrity' of git://git.kernel.org/pub/scm/linux/kernel/gi...Linus Torvalds2020-04-0219-34/+19
|\
| * ima: add a new CONFIG for loading arch-specific policiesNayna Jain2020-03-121-0/+7